General
-
Target
bac498dd4ada78968fb82f772f1529352d72e52073fe2dbddc232be7c3f3ec14
-
Size
3.4MB
-
Sample
210416-cwf2yvvc52
-
MD5
aa7c5edc939599bc70f451eb4e125a3b
-
SHA1
a702ffdc2edad2d8b3b45ec4977a12710ae9b9fc
-
SHA256
bac498dd4ada78968fb82f772f1529352d72e52073fe2dbddc232be7c3f3ec14
-
SHA512
8e20f7035c5aac6857b3b065fee715974eb212b9f7a65bb3aa741cc8ad6898d6fbd58808665b8b4468f7f5faa1aa0a12f91892f87f60b8f5a599cd3cb18248bd
Static task
static1
Behavioral task
behavioral1
Sample
bac498dd4ada78968fb82f772f1529352d72e52073fe2dbddc232be7c3f3ec14.apk
Resource
android-x86_arm
Malware Config
Extracted
cerberus
http://198.144.191.142/
Targets
-
-
Target
bac498dd4ada78968fb82f772f1529352d72e52073fe2dbddc232be7c3f3ec14
-
Size
3.4MB
-
MD5
aa7c5edc939599bc70f451eb4e125a3b
-
SHA1
a702ffdc2edad2d8b3b45ec4977a12710ae9b9fc
-
SHA256
bac498dd4ada78968fb82f772f1529352d72e52073fe2dbddc232be7c3f3ec14
-
SHA512
8e20f7035c5aac6857b3b065fee715974eb212b9f7a65bb3aa741cc8ad6898d6fbd58808665b8b4468f7f5faa1aa0a12f91892f87f60b8f5a599cd3cb18248bd
-
Loads dropped Dex/Jar
Runs executable file dropped to the device during analysis.
-